{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:41:12Z","timestamp":1730205672860,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/cec.2015.7257208","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T21:22:46Z","timestamp":1442265766000},"page":"2595-2602","source":"Crossref","is-referenced-by-count":0,"title":["An evolving trust paradigm for enforcing computing system security"],"prefix":"10.1109","author":[{"given":"Orhio Mark","family":"Creado","sequence":"first","affiliation":[]},{"given":"Jan","family":"Newmarch","sequence":"additional","affiliation":[]},{"given":"Phu","family":"Dung Le","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NGSCB Trusted Computing Base and Software Authentication","article-title":"Microsoft","year":"2003","key":"ref10"},{"journal-title":"Security Model for the Next-Generation Secure Computing Base","year":"2003","key":"ref11"},{"journal-title":"Hardware platform for the next-generation secure computing base","year":"2003","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-540-27800-9_8","volume":"3108","author":"peinado","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref14","first-page":"1","article-title":"Bootstrapping trust in a &#x201C;trusted&#x201D; platform","author":"parno","year":"2008","journal-title":"Proceedings of the 3rd Conference on Hot Topics in Security"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-642-16576-4_5","article-title":"Trustworthy organic computing systems: Challenges and perspectives","volume":"6407","author":"steghofer","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"article-title":"Human to computer trust in urban pervasive computing","year":"2011","author":"bevan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2008.05.005"},{"key":"ref18","first-page":"294","article-title":"A concept framework for decentralizing computing system security","author":"creado","year":"2014","journal-title":"International Symposium on Computer Science and Electrical Engineering (ISCSEE)"},{"key":"ref19","first-page":"3","author":"silberschatz","year":"2009","journal-title":"Operating System Con-cepts"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176998"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133600"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1188913.1188921"},{"journal-title":"Trusted Computing Group","article-title":"Tcg specification architecture overview","year":"2007","key":"ref8"},{"journal-title":"Trusted platform module library specification","article-title":"Trusted Computing Group","year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.184"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02319-4_72"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30232-2_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2014.4212"}],"event":{"name":"2015 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2015,5,25]]},"location":"Sendai","end":{"date-parts":[[2015,5,28]]}},"container-title":["2015 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7229815\/7256859\/07257208.pdf?arnumber=7257208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T01:04:38Z","timestamp":1598576678000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7257208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cec.2015.7257208","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}